r r PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-0-hoverPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONPRODUCTDEVELOPMENTRAWMATERIALS PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-3PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCTION &OPERATION stage-4PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTPRODUCT USE & END OF PRODUCT LIFEPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT stage-5PRODUCT USE & END OF PRODUCT LIFELOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENTLOGISTICS &DISTRIBUTIONPRODUCTION &OPERATIONRAWMATERIALSPRODUCTDEVELOPMENT

Mitigating Cyber Threats

As ICL becomes more dependent on information technologies to conduct its operations, and as the number and sophistication of cyber attacks increase, the risks associated with cyber security increase. ICL has taken many steps in recent years in response to the steady increase in the number and severity of security and cyber threats. \

ICL is implementing a global program to protect the Company’s IT and ICS (industrial control systems). This program includes separating information networks from computerized process networks, physical protection of computer rooms, servers and terminals and employee training. IT security personnel have been appointed, an integrated approach for addressing the issue has been formulated and work plans have been prepared and implemented globally. In addition, risk surveys have been performed at all plants in Israel and at several plants located in other countries.

 

Each year ICL’s IT undergoes 1-3 security breaches tests which are assessed by an external auditor.

ERM cybersecurity

ERM cybersecurity activities are managed and controlled by ICL’s CISO (Chief Information Security Officer) and ICL’s global CIO. Quantitative goals have been established for implementing a multi-year work plan to advance these issues and to adapt ICL’s operations to numerous threats.

ICL has implemented Cybersecurity policy and Cyber Attack and Crisis procedures in all company's operations, in addition company and contractor employees undergo annual training on Cybersecurity and data privacy issues.

Mobile Threat Defense

As part of ICL's global effort to maintain a high standard of information security and support current and future needs, IT Cyber Security and CISO teams will implement Mobile Threat Defense solutions. The Mobile Threat Defense provides continuous, on-device protection for mobile devices analogous to traditional antivirus with advanced technology capabilities. 

Personnel Training and Awareness

All IT and OT company and contractor employees participate in several mandatory workshops and virtual training sessions on IT topics.

ICL Global ESG Week

ICL’s Global ESG week included multiple virtual events and other activities with more than 2,999 participants from all around the world: Israel, Europe, the Americas and China. As part of this week employees participated in awareness training for information, cyber security and data privacy topics. ICL’s practices regarding data privacy are based on EU (GDPR) and Israeli regulations.

We use cookies to provide our services and for analytic and marketing purposes. To find out more about our use of cookies, please see our privacy policy.
By continuing to browse our website, you agree to our use of cookies.